The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG within the same rate-limit period as another process.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-1445 from the MITRE CVE dictionary dictionary and NIST NVD.
Not Vulnerable. This issue does not affect the version of python-crypto package as shipped with Red Hat Enterprise Linux 6.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 2.6 |
---|---|
Base Metrics | AV:N/AC:H/Au:N/C:P/I:N/A:N |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 6 | python-crypto | Not affected |